CISMP Questions Flashcards
Which of the following provides an incorrect characteristic of a memory leak?
A. Common programming error
B. Common when languages that have no built-in automatic
garbage collection are used
C. Common in applications written in Java
D. Common in applications written in C++
Option C. provides an incorrect characteristic of a memory leak.
Memory leaks are common programming errors that occur when dynamic memory allocation is not managed properly, especially in languages that have no built-in automatic garbage collection, such as C and C++. Java, on the other hand, has built-in automatic garbage collection, which can help prevent memory leaks. Therefore, Option C is incorrect.
Which of the following is the best description of the security kernel and the reference monitor?
A. The reference monitor is a piece of software that runs on top of the security kernel. The reference monitor is accessed by every security call of the security kernel. The security kernel is too large to test and verify.
B. The reference monitor concept is a small program that is not related to the security kernel. It will enforce access rules upon subjects who attempt to access specific objects. This program is regularly used with modern operating systems.
C. The reference monitor concept is used strictly for database access control and is one of the key components in maintaining referential integrity within the system. It is impossible for the user to circumvent the reference monitor.
D. The reference monitor and security kernel are core components of modern operating systems. They work together to mediate all access between subjects and objects. They should not be able to be circumvented and must be called upon for every access attempt.
D. The reference monitor and security kernel are core components of modern operating systems. They work together to mediate all access between subjects and objects. They should not be able to be circumvented and must be called upon for every access attempt.
Which of the following statements describes the concept of non-repudiation?
A The ability to prove that an event occurred.
B The use of public key cryptography to prevent the republishing of keys.
C A technology-based non-disclosure agreement.
D Cyber security insurance to help reduce reputational harm.
A The ability to prove that an event occurred.
Non-repudiation is the concept in cybersecurity that ensures that the parties involved in a transaction or communication cannot deny their involvement in the exchange and cannot refute the authenticity of the message or action. It provides a way to prove the integrity of the transaction or communication and that it occurred as intended, without the possibility of one party later denying their involvement. This is typically achieved through the use of digital signatures or other cryptographic methods to create a tamper-evident record of the exchange. Option A, “the ability to prove that an event occurred,” accurately describes the concept of non-repudiation.
Which term describes the concept used in information security in which multiple layers of security controls are placed within a system?
A Defence in depth.
B Honeypot.
C Fail safe.
D Anti-malware.
A. Defence in depth
Defence in depth is a concept used in information security in which multiple layers of security controls are placed throughout an information technology system.
Which two terms are used in combination to define levels of risk?
A Threat and Impact.
B Threat and Vulnerability.
C Impact and Likelihood.
D Likelihood and Vulnerability.
C Impact and Likelihood.
The level of risk is determined by evaluating the potential impact of a threat and the likelihood of that threat occurring. Impact refers to the potential harm that could result from a threat, while likelihood refers to the probability of that threat occurring. By considering both factors together, an organization can determine the level of risk associated with a particular threat and take appropriate measures to manage or mitigate that risk.
Which of the following is NOT a principle of information security management?
a) Confidentiality
b) Integrity
c) Availability
d) Accountability
D. Accountability
The CIA principles consist of:
Confidentiality
Integrity
Availability
Ursula recently discovered that a group of developers are sharing information over a messaging tool provided by a cloud vendor but not sanctioned by her organisation. What term best describes this use of technology?
A) Shadow IT
B) System integration
C) Vendor management
D) Data exfiltration
A) Shadow IT
The term that best describes this use of technology is “Shadow IT.” Shadow IT refers to the use of technology, such as applications or services, by employees within an organization without the knowledge, approval, or oversight of the IT department or organization’s management. In this case, the developers are using a messaging tool provided by a cloud vendor that is not sanctioned or approved by Ursula’s organization. This unauthorized use of technology falls under the category of Shadow IT.
Adam is conducting software testing by reviewing the source code of the application. What type is code testing is Adam conducting?
A) Mutation testing
B) Static code analysis
C) Dynamic code analysis
D) Fuzzing
B) Static Code Analysis
The type of code testing that Adam is conducting by reviewing the source code of the application is “Static code analysis.” Static code analysis is a type of code testing that involves analysing the source code without actually executing it. It aims to identify potential coding issues, security vulnerabilities, coding standards violations, and other defects in the codebase. By reviewing the source code, Adam is performing a static analysis to identify any potential issues or areas that require improvement in the code.
Which of the following code testing techniques involves analysing the behaviour of a software application during its execution?
A) Mutation testing
B) Static code analysis
C) Dynamic code analysis
D) Fuzzing
C) Dynamic code analysis
Explanation: Dynamic code analysis, also known as runtime analysis, focuses on analysing the behaviour of a software application during its execution. It involves monitoring the application’s runtime characteristics, such as input data, function calls, and interactions with external systems, to detect runtime errors, performance issues, and security vulnerabilities. This technique provides insights into the application’s behaviour that may not be apparent from static code analysis or other testing techniques.
Which of the following best describes the purpose of fuzzing in software testing?
A) Verifying code syntax and formatting.
B) Assessing the performance and scalability of an application.
C) Identifying vulnerabilities and defects through unexpected input.
D) Evaluating user experience and interface design.
C) Identifying vulnerabilities and defects through unexpected input.
Fuzzing is a software testing technique that involves sending random or malformed data as input to an application to discover potential vulnerabilities or weaknesses in its handling of such input. By subjecting the application to unexpected or invalid input, fuzzing helps identify bugs, crashes, or security vulnerabilities that may not have been discovered through traditional testing methods. Well done!
What is the primary objective of mutation testing?
A) To identify defects in the source code
B) To generate random test cases for the application
C) To evaluate the effectiveness of the test suite
D) To measure the performance of the application
C) To evaluate the effectiveness of the test suite.
Mutation testing is specifically designed to assess the quality of the test suite by introducing small changes or mutations to the code and checking if the existing test cases can detect these mutations. It helps identify weaknesses in the test suite and improve its ability to catch potential defects in the code.
Wendy is scanning cloud based repositories for sensitive information. Which one of the following should concern her most if discovered in a public repository?
A) Product manuals
B) Secure code
C) API keys
D) Open source data
C) API (application programming interface) keys
If Wendy discovers API keys in a public repository, it should be a significant concern. API keys are sensitive credentials that provide access to various services and resources in an application or system. If exposed to the public, malicious actors could potentially misuse these API keys to gain unauthorized access, manipulate data, or launch attacks.
API keys are typically used for authentication and authorization purposes, allowing applications to interact securely with APIs and services. Exposing API keys in a public repository increases the risk of unauthorized access and potential data breaches.
It is important to protect API keys and keep them confidential. Best practices include storing them securely, using encryption, and restricting access to authorized individuals or systems.
What is a repository in the context of software development?
A) A secure storage facility for physical documents
B) A web-based platform for hosting and sharing code
C) A tool for tracking and managing project tasks
D) A programming language used for software development
B) A web-based platform for hosting and sharing code.
A repository in software development is a centralized location where developers can store, manage, and collaborate on code, making it easier to track changes, review code, and ensure version control. Examples of popular repositories include GitHub, Bitbucket, and GitLab.
What type of malware connects to a command and control system allowing attackers to manage, control and update it remotely?
A) Bot
B) Drone
C) Vampire
D) Worm
A) Bot.
A bot is a type of malware that connects to a command and control (C&C) system, allowing attackers to remotely manage, control, and update the infected device or network of devices. Bots can be used for various malicious activities, such as launching distributed denial-of-service (DDoS) attacks, stealing sensitive information, or spreading malware to other systems.
Which of the following metrics describes the type of information disclosure that might occur if an attacker successfully exploits the vulnerability?
A) Integrity
B) Availability
C) Scope
D) Confidentiality
D) Confidentiality
Confidentiality, in the context of information security, refers to the property of ensuring that data is accessible only to authorized individuals or entities. It involves protecting sensitive or classified information from unauthorized disclosure or access.
When an attacker successfully exploits a vulnerability, the type of information disclosure that occurs typically relates to confidentiality. It means that the attacker gains unauthorized access to sensitive information, such as personal data, financial records, intellectual property, or any other confidential information that should be protected.
Maintaining confidentiality is crucial to prevent unauthorized disclosure and protect the privacy and confidentiality of sensitive information. Organizations implement various security measures such as encryption, access controls, data classification, and secure communication protocols to ensure the confidentiality of their data.
Which of the following is a malicious program that self-copies and self-replicates?
A) Spyware
B) Bot
C) Virus
D) Rootkit
C) Virus
A virus is a type of malicious program that has the ability to self-copy and self-replicate by inserting its code into other legitimate programs or files. It spreads from one system to another by attaching itself to executable files, documents, or other data files. When the infected file is executed, the virus code is activated, allowing it to reproduce and infect other files or systems.
Viruses can cause various types of harm, such as data corruption, system instability, unauthorized access, and spreading to other connected devices or networks. They often have malicious payloads that can perform actions like deleting files, stealing information, or disrupting system operations.
To prevent virus infections, it is important to have up-to-date antivirus software, regularly scan systems and files for viruses, avoid downloading files from untrusted sources, and exercise caution when opening email attachments or clicking on suspicious links.
Renee is configuring her vulnerability management solution to perform credentialed scans of servers on her network. What type of account should she provide to the scanner?
A) Domain administrator
B) Local administrator
C) Root
D) Read-only
D) Read-only
Credentialed scans only require read-only access to target servers. Using a local administrator account would have similar issues but the problems caused by the scanner would be limited to the local system. The root account is just another name for the local administrator account. Renee should follow the principle of least privilege and limit the access available to the scanner by using a read-only account. Using a domain administrator account would provide far more privileges than necessary, allowing the scanner to potentially disrupt almost any device on the network.
Which role in the organisational structure is responsible for developing and implementing an information security program and providing guidance on cyber strategy at a strategic level?
A) CFO (Chief Financial Officer)
B) CIO (Chief Information Officer)
C) COO (Chief Operating Officer)
D) CISO (Chief Information Security Officer)
D) CISO (Chief Information Security Officer).
The CISO is responsible for developing and implementing an information security program and providing guidance on cyber strategy at a strategic level. This role ensures that information assurance is prioritized and accounted for within the organization’s structure.
Which senior leadership role is responsible for managing the finances and records of the company, ensuring financial reporting, and making business decisions based on sound financial criteria?
A) CEO (Chief Executive Officer)
B) CFO (Chief Financial Officer)
C) CIO (Chief Information Officer)
D) COO (Chief Operating Officer)
B) CFO (Chief Financial Officer)
The senior leadership role responsible for managing the finances and records of the company, ensuring financial reporting, and making business decisions based on sound financial criteria is the CFO (Chief Financial Officer).
In an organizational structure, which senior leadership role is responsible for managing the day-to-day operations of the company?
a) CEO (Chief Executive Officer)
b) CFO (Chief Financial Officer)
c) COO (Chief Operating Officer)
d) CISO (Chief Information Security Officer)
C) COO (Chief Operating Officer)
The senior leadership role responsible for managing the day-to-day operations of the company is the COO (Chief Operating Officer).
Which roles in the organizational structure are typically responsible for information security at a strategic level? Select two.
A) CEO (Chief Executive Officer)
B) CIO (Chief Information Officer)
C) CISO (Chief Information Security Officer)
D) CFO (Chief Financial Officer)
Please select two options from the provided choices.
B and C
The roles of CIO (Chief Information Officer) and CISO (Chief Information Security Officer) are typically responsible for information security at a strategic level. Well done!
Which roles are responsible for managing the financial aspects of a company? Select two options.
A) CEO (Chief Executive Officer)
B) CFO (Chief Financial Officer)
C) CIO (Chief Information Officer)
D) CISO (Chief Information Security Officer)
A) CEO (Chief Executive Officer)
B) CFO (Chief Financial Officer)
- CEO (Chief Executive Officer): The CEO is the head of the company or organization and is responsible for overall management and decision-making. While the CEO may not directly handle financial matters on a day-to-day basis, they have the ultimate responsibility for financial performance and strategic financial decision-making.
- CFO (Chief Financial Officer): The CFO is specifically responsible for managing the financial aspects of the company. This includes overseeing financial planning, budgeting, financial reporting, and ensuring compliance with financial regulations. The CFO plays a key role in making financial decisions that impact the organization’s operations and long-term financial health.
Both the CEO and CFO have important roles in managing the financial aspects of a company, with the CFO specifically focusing on financial management and reporting while the CEO holds the overall responsibility for the organization’s financial performance.
Which of the following responsibilities is typically assigned to an Information Security Manager (ISM)? (Select 2 possible answers)
A) Developing business strategies and financial planning
B) Conducting vulnerability assessments and penetration testing
C) Managing the organization’s human resources and personnel
D) Establishing and maintaining physical security controls
Remember, we are looking for the responsibility typically assigned to an Information Security Manager.
B) Conducting vulnerability assessments and penetration testing.
D) Establishing and maintaining physical security controls
The responsibility of an Information Security Manager typically involves overseeing the implementation of security controls and practices, including conducting assessments to identify vulnerabilities and performing penetration testing to assess the effectiveness of security measures. This helps ensure the organization’s systems and data are adequately protected against potential threats.
Establishing and maintaining physical security controls (option D) may fall under the responsibility of a different role, such as a Facilities Manager or a Physical Security Manager.
Which of the following responsibilities is typically associated with an Information Security Manager?
A) Designing network architectures and infrastructure
B) Developing and implementing security policies and procedures
C) Managing software development projects
D) Conducting forensic investigations
B) Developing and implementing security policies and procedures.
An Information Security Manager is primarily responsible for overseeing the development and implementation of security policies and procedures within an organization. This includes creating and enforcing security standards, guidelines, and best practices to protect the organization’s information assets. While network architecture and infrastructure (option A) may fall under the purview of an IT or network specialist, managing software development projects (option C) typically belongs to a software development or project management role. Conducting forensic investigations (option D) is often handled by a dedicated forensic analyst or incident response team.